easy $100 | bypass 403 to 200 ok
好的,我需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读文章,抓住主要信息。 文章讲的是作者通过简单的侦察工具Shodan发现了目标网站的一个子域名。接着使用dirsearch进行目录遍历,找到了一个受限的.env文件。虽然Cloudflare的WAF阻止了直接访问,但作者通过Shodan找到源服务器IP,绕过了WAF,成功获取了.env文件。这个文件里有数据库凭证、会话密钥等敏感信息。作者报告了这个漏洞,获得了100美元的奖励。 现在要将这些内容浓缩到100字以内。需要涵盖侦察工具、发现子域名、目录遍历、绕过WAF、获取敏感文件以及漏洞报告和奖励。 可能的结构是:作者利用Shodan发现子域名,使用dirsearch找到受限文件,通过源IP绕过WAF获取.env文件中的敏感信息,并获得奖励。 检查字数是否合适,确保不超过限制。 </think> 作者通过Shodan侦察发现目标网站子域名,并利用dirsearch工具找到受限的.env文件。尽管Cloudflare WAF阻止直接访问,但通过源IP绕过WAF后成功获取包含数据库凭证和API路由等敏感信息的.env文件,并因此获得100美元漏洞奖励。 2026-1-25 14:25:4 Author: infosecwriteups.com(查看原文) 阅读量:1 收藏

Swarnim Bandekar

can you even imagine what most people do?
they do recon, burst out some payloads and think that’s bbh?
naahh man, ill show you how a simple recon got me $100

Press enter or click to view image in full size

Press enter or click to view image in full size

I used shodan for the recon. I put the target in the query and I got various results where one was updated on the same day when I was checking.
https://www.shodan.io/search?query=redacted.com

Press enter or click to view image in full size

I than went to https://sub.sub.redacted.com and found a page which had literally nothing in it.

then i thought of fuzzing the website, i used dirsearch with the common wordlist.

dirsearch -u https://sub.sub.redacted.com/

i got to see a 403 on /.env which says the file is available but not accessible and when i tried to visit https://sub.sub.redacted.com/.env i got a cloudflare error saying “Sorry, you have been blocked You are unable to access redacted.com

One Question That Matters

If the WAF blocks me
what is it protecting?

A WAF only protects what it sits in front of.
If the origin server is exposed
the WAF means nothing.

So I went looking for the real server.

Shodan Changed Everything

WAF Bypass in One Step

Accessing the application through the origin IP completely bypassed the WAF.
No filters
No blocks
No warnings

Get Swarnim Bandekar’s stories in your inbox

Join Medium for free to get updates from this writer.

Requesting the .env file returned a clean 200 OK.

The production environment file was exposed.

What Was Leaked

The file contained critical production secrets.

Database credentials
Session signing keys
Internal API routes

This was more than a file leak.
It was a full security control bypass.

Why This Is Serious

An attacker could avoid every WAF rule.
No rate limiting
No injection filters
No detection
With valid credentials, backend systems were within reach.
This is how small misconfigs turn into big breaches.

reported it and got it fixed quickly with a P2 with $100, not much but not bad i guess.


文章来源: https://infosecwriteups.com/easy-100-bypass-403-to-200-ok-b6bc126e2f4b?source=rss----7b722bfd1b8d--bug_bounty
如有侵权请联系:admin#unsafe.sh